Rectilinear and Polygonal p-piercing and p-center Problems. Micha Sharir y Emo Welzl z. 1 Introduction. piercing points.

Size: px
Start display at page:

Download "Rectilinear and Polygonal p-piercing and p-center Problems. Micha Sharir y Emo Welzl z. 1 Introduction. piercing points."

Transcription

1 Rectilinear and Polygonal p-piercing and p-center Problems Micha Sharir y Emo Welzl z Abstract We consider the p-piercing problem, in which we are given a collection of regions, and wish to determine whether there exists a set of p points that intersects each of the given regions. We give linear or near-linear algorithms for small values of p in cases where the given regions are either axisparallel rectangles or convex c-oriented polygons in the plane (i.e., convex polygons with sides from a xed nite set of directions). We also investigate the planar rectilinear (and polygonal) p-center problem, in which we are given a set S of n points in the plane, and wish to nd p axis-parallel congruent squares (isothetic copies of some given convex polygon, respectively) of smallest possible size whose union covers S. We also study several generalizations of these problems. New results are a linear-time solution for the rectilinear 3-center problem (by showing that this problem can be formulated as an LP-type problem and by exhibiting a relation to Helly numbers). We give O(n log n)-time solutions for 4-piercing of translates of a square, as well as for the rectilinear 4-center problem; this is worst-case optimal. We give O(n polylog n)-time solutions for 4- and 5-piercing of axis-parallel rectangles, for more general rectilinear 4- center problems, and for rectilinear 5-center problems. 2- pierceability of a set of n convex c-oriented polygons can be decided in time O(c 2 n log n), and the 2-center problem for a convex c-gon can be solved in O(c 5 n log n) time. The rst solution is worst-case optimal when c is xed. Both authors acknowledge support by G.I.F. the German Israeli Foundation for Scientic Research and Development, and by a Max Planck Research Award. Work by Micha Sharir has also been supported by National Science Foundation Grants CCR and CCR , and by grants from the U.S.{Israeli Binational Science Foundation, and the Israel Science Fund administered by the Israeli Academy of Sciences. Emo Welzl has also been supported by a Leibniz Prize from the German Research Society, We 1265/5-1. Part of the work on this paper was done during the participation of Emo Welzl in the Special Semester on Combinatorial and Computational Geometry, organized by the Mathematical Research Institute of Tel Aviv University. y School of Mathematical Sciences, Tel Aviv University, Tel Aviv 69978, Israel, and Courant Institute of Mathematical Sciences, New York University, New York, NY 10012, USA. z Institut fur Informatik, Freie Universitat Berlin, and Departement Informatik, ETH Zurich, CH-8092 Zurich, Switzerland. 1 Introduction The problems. Let R be a set of n regions in the plane, and let p be a positive integer. R is called p-pierceable if there exists a set of p piercing points which intersects every member of R. The p-piercing problem is to determine whether R is p-pierceable, and, if so, to produce a set of p piercing points. In the p-center problem we are given a set S of n points in the plane, some compact convex set C, and a positive integer p. The goal is to nd p isothetic copies of C of smallest possible scaling factor, whose union covers S. This problem arises in the area of facility location in operations research, and many variants of it have been studied [7, 8, 10, 11, 19, 23, 25, 28, 30, 31, 33]. If C is the unit ball of some norm k k C, then the p-center problem seeks a set P of p `facility points', so that the maximum k k C-distance from a point of S to its nearest facility point is minimized. A natural case is when C is a unit disk, so k k C is the euclidean distance (euclidean p-center problem). When C is a square, then k k C can be viewed as the `1- or `1-norm (depending on the orientation of the square), and we face the rectilinear p-center problem. A standard reduction from the p-center problem to the p-piercing problem goes as follows. Let C ~ denote the re- ection of C (with respect to some interior point, which we assume to be the origin). Dene R() = fs + C ~ j s 2 Sg, 0. Then we seek the smallest possible for which R() is p-pierceable. The piercing points (for the smallest ) are the locations of the desired facilities; they serve as centers of isothetic copies of C whose union covers S. Often, the p-center problem is solved by techniques like parametric searching [29] or monotone matrix searching [13, 14, 15], which run some sort of binary search on to locate the optimal solution. The related p-piercing problem, for any xed, is then referred to as the decision problem, or the xedsize problem, and is used as an `oracle' to guide the binary search. Previous results. It is known that the p-piercing and p-center problems are NP-complete when p is part of the input, even if the regions are translates of a square [31], and that they can be solved in polynomial time for any xed p (assuming that C and the sets to be pierced are simply shaped, see [7, 24]). The 1-piercing problem is easy for simple regions, and the 1-center problem is well understood at this point and allows optimal linear-time solutions for many types of regions we will not elaborate on this here (see [27, 34]). The euclidean 2- center problem was recently solved in near-linear time [33], but no such solution is known for p 3. The 2- and 3- piercing problems for a set of axis-parallel rectangles have

2 been solved in linear time [22, 23]. 1 The rectilinear 2-center problem was also known to be optimally solvable in linear time [8], while the best previous solution for the rectilinear 3-center problem takes O(n log n) time [8, 23]. Actually, the papers [22, 23] consider a slightly more general version, the so-called weighted rectilinear p- center problem: Here we are given n axis-parallel squares, not necessarily of the same size. We ask for the smallest common scaling factor, so that the scaled squares (where the scaling is about the center of each square) is still p- pierceable. It is shown in [22] that the weighted rectilinear 2-center problem is solvable in linear time. 2-pierceability of c-oriented convex polygons is closely related to a conjecture of Danzer and Grunbaum [6], which asks for a Helly-type theorem for collections of homothets of a convex polygon, and which was recently refuted in [20]. For p > 3, the best previous bound for the rectilinear p-center problem is O(n p 2 log n) [24]. No near-linear solutions have previously been known for the p-piercing or p-center problem in the general polygonal case, for p 2. New results. We improve the O(n log n) bound for the (weighted) rectilinear 3-center problem to optimal linear time. For the (unweighted) rectilinear 4-center problem we give an O(n log n) solution, and for the rectilinear 5-center problem we describe an O(n log 5 n) solution, thereby improving on the previous bounds of the form O(n 2 log n) and O(n 3 log n), respectively. The 4-center algorithm is also worst-case optimal. The new bounds for the center problems are based on new results for the corresponding piercing problems: 4-piercing of translates of a square can be decided in O(n log n) time, 4- (and 5-) piercing of general axis-parallel rectangles can be decided in time O(n log 3 n) (and O(n log 4 n), respectively). These results also lead to O(n polylog n) algorithms for the weighted rectilinear 4- and 5-center problems. Our solutions also imply that the rectilinear p-center problem, for any p 5, can be solved in time O(n p 4 log 5 n). We believe, however, that much better results can be obtained for larger p's. The 2-center problem, when C is a convex c-gon (polygonal 2-center problem), can be solved in O(c 5 n log n) time. This is based on 2-piercing of c-oriented convex polygons (whose sides draw their directions from a xed set of c orientations), for which we supply an O(c 2 n log n) solution, and show that it is worst-case optimal when c is xed. 2-piercing of a set of homothetic triangles, and the triangular 2-center problem, can both be solved in linear time. The same holds for 4-oriented trapezoids. Independently, Katz and Nielsen [21] have recently obtained several results on the piercing problems studied in this paper, and also results concerning 2-piercing of boxes, simplices, and c-oriented polytopes in higher dimensions. They have not addressed the related center problems. Methods. In order to obtain the linear bound for the 3-center problem, we formulate it as an LP-type problem 1 In fact, the results in [23] are stated only for homothets of squares. [26], from which a randomized linear-time algorithm follows, which can also be derandomized to a deterministic linear-time solution [5]. The proof of the LP-type properties (and of nite combinatorial dimension see below) relies on a Helly-type result of the following kind [6]: A set of axisparallel rectangles is 3-pierceable if and only if any 16 (or fewer) of them are 3-pierceable. The connection between Helly-numbers and LP-type problems has been investigated in [3, 4]. The realization of the rectilinear 3-center problem as an LP-type problem seems to be particularly interesting, since there is no formulation of this problem as a convex optimization in a convex domain, which shows that LP-type problems go beyond convex programming (in natural examples). The basis for the rectilinear piercing results are a number of simple observations on the location of piercing points, which have already been used (in one or another disguise) in previous attacks on the rectilinear problem [8, 22, 23]. We enhance those insights by a carefully planned iterative process (for 4-piercing of translates of a square), and by multi-level data structures (for general rectilinear 4- and 5- piercing). These observations can also be extended (but become slightly more involved) to the case of c-oriented polygons, which leads to an O(n log n) solution of the 2-piercing problem for such polygons. (The case of triangles or of trapezoids can be formulated as an LP-type problem, but there is also a simple deterministic linear-time solution.) For both the standard rectilinear and polygonal cases, the reduction from the center to the piercing problem uses the matrix-searching technique of Frederickson and Johnson [13, 14, 15], in a manner similar to recent applications in [17]. For the weighted rectilinear and polygonal cases, we employ standard parametric searching techniques [29]. 2 Rectilinear p-piercing We are given a set R of n axis-parallel closed rectangles in the plane and some positive integer p, and we wish to decide whether R is p-pierceable. We start with some basic observations for general p (see also [8, 22, 23]), and then \specialize" to p = 2; : : : ; 5 to obtain linear or near-linear solutions. An axis-parallel line traverses R. Suppose a vertical line ` intersects all rectangles in R (the case where ` is horizontal is treated similarly), and let P be some set of piercing points. Consider a 2 P. If we move a on a horizontal segment towards `, then we do not leave any of the rectangles (we may enter some). That is, if we replace each a 2 P by its horizontal projection a 0 on `, then the resulting set P 0 is still piercing. Consequently, the p-piercing problem can be solved by deciding p-pierceability of the intervals R 0 = f` \ r j r 2 Rg on `. This 1-dimensional piercing problem can be easily solved in linear time (see, e.g., [18, p. 193]). So if there is a vertical (or horizontal) line intersecting all rectangles, the problem can be solved in linear time for any xed p. No axis-parallel line traverses R. Let `L be the vertical line containing the leftmost right edge of a rectangle in 2

3 `L R 0 Figure 1: A 4-pierceable set of axis-parallel rectangles and its location domain R 0 R, let `R be the vertical line containing the rightmost left edge of a rectangle in R, let `T be the horizontal line containing the highest bottom edge of a rectangle in R, and let `B be the horizontal line containing the lowest top edge of a rectangle in R. Consider the closed left halfplane H L bounded by `L, the closed right halfplane H R bounded by `R, the closed top halfplane H T bounded by `T, and the closed bottom halfplane H B bounded by `B. Let H ~ X denote the closure of the complement of H X, for X = L; R; T; B. Note that if no axis-parallel line traverses R, then H L is disjoint T from H R, and H T is disjoint from H B, and thus R 0 := ~ X2fL;R;T;Bg H X is nonempty (with nonempty interior). R 0 is called location domain for R, a term justied in the following simple but crucial observation. Observation 2.1 (a) Any set of piercing points of R must have a point in each of the halfplanes H X, for X = L; R; T; B. (b) Assume that R is p-pierceable, but has no axis-parallel traversing line. Then there is a set of p piercing points in the location domain R 0. In such a piercing set, each side of the 0 of R 0 must contain one of the piercing points. (Here we consider the sides as relatively closed, that is, a vertex 0 is contained in its two incident sides.) See Figure 1. (a) is trivially true, since each halfplane H X fully contains one of the rectangles in R, for X = L; R; T; B, and so it must contain a piercing point. For (b), consider a piercing set P and a point a 2 P which is not in ~ H L, i.e., it is to the left of `L. Similar to a previous argument, we consider the horizontal projection a 0 of a on `L. The set of rectangles containing a 0 is a superset of the set of rectangles containg a. Hence we can replace a by a 0 in P without losing its piercing property, and a 0 is contained in ~ H L. A similar procedure can be employed if a piercing point is not in ~ H R, ~H T, or ~ H B. In this way we can move every piercing point that lies outside the location domain R 0 to its boundary (up to two steps may be necessary for each point). After that, the piercing set is contained in R 0, but (a) is still valid, and so each side of R 0 must contain a piercing point and 3-piercing If we want to decide whether a set of axis-parallel rectangles is 2-pierceable, we rst determine `L and `R. If `L is not to `R `T `B the left of `R, then a vertical line (say `L or `R) intersects all rectangles and we can invoke the simple 1-dimensional decision procedure. Otherwise, we apply a symmetric procedure for `T and `B. What remains is the case that the location domain R 0 is a nonempty rectangle. Observation 2.1(b) states that if R is 2-pierceable, then it is pierceable by two points in R 0, with one point on each side of R 0, and the only candidates for such a set are the two diagonal pairs of vertices 0. We can check these two possibilities in linear time. For 3-pierceability, we can either apply the 1-dimensional procedure, or R 0 exists, and now, by Observation 2.1(b), a piercing set of 3 points contained in R 0 must contain one of the vertices 0. We can take each of those vertices v, and check for 2-pierceability of the rectangles disjoint from v. If one of the four possibilities is successful, then R is 3-pierceable; otherwise, it is not. Summing up, we get the following result, which is at least implicitly also implied by [8, 22, 23]. Theorem and 3-pierceability of a set of n axisparallel rectangles can be decided in O(n) time. Remark. One can make the above algorithms more concise to state and implement by writing down an explicit list of a constant number of candidate sets of pairs or triples of piercing points, which depend on the given set of rectangles, so that this set is 2- or 3-pierceable if and only if one of these sets is piercing. We will do this below, when we talk about the corresponding 2- and 3-center problems piercing of translates of a square Let Q be a set of n translates of a square of unit side length, for which we want to decide the existence of 4 piercing points. Again, we may assume that the location domain R 0 exists. We can easily decide whether there is a piercing set of four points, one of which is a vertex 0: Take each such vertex in turn, and test for 3-pierceability of the squares disjoint from it, in linear time. So if all these attempts to nd a set of four piercing points fail, and Q is 4-pierceable, then we know, by Observation 2.1(b), that there must be four piercing points, one in the relative interior of each of the sides of R 0. Denote those sides (relatively open segments) by s X, for X = L; R; T; B. We manipulate a set Q 0 (initially Q 0 = Q), and four segments t X, for X = L; R; T; B (initially t X = s X ), while maintaining the following invariant: Q is pierceable by four points, one in each s X if and only if Q 0 is pierceable by four points, one in each t X. The invariant is trivially true at the initialization stage. The operations we perform are the following: (i) If a square q in Q 0 intersects only one of the segments t X, then we replace 2 t X by t X \ q and remove q from Q 0. (ii) If a square q contains one of the segments t X, then we remove q from Q 0. Clearly, the invariant is maintained after each operation of type (i) or (ii). Note that we can apply right at the start four operations of type (i), to the four squares dening R 0 2 Note that, as soon as a segment t X is shortened, it is not relatively open any more. 3

4 (as in Figure 1). We may end up in one of the following three situations: (A) At some point a square in Q 0 is disjoint from all segments t X. That is, Q 0 is not pierceable by points on the segments t X, and the invariant implies that Q is not pierceable by points, one on each s X. With the previous assumptions, we conclude that Q is not 4-pierceable. (B) At some point Q 0 is empty. We conclude that Q is 4- pierceable. (Note here that the segments t X can never vanish in the process.) (C) Neither (i) nor (ii) can be applied, Q 0 is still nonempty, and no square in Q 0 is disjoint from all segments t X. That is, each square intersects at least two of the segments t X, and no square contains one of those segments. Actually, both conditions combined imply that every square intersects exactly two segments (because, if a square intersects three of the sides of R 0, it must contain one of the sides). Note that in all we have said so far we never used the fact that we are handling congruent squares; everything also holds for general axis-parallel rectangles. We now claim that, for translates of a square, case (C) already implies 4- pierceability. For that purpose, let P 0 be the set of counterclockwise endpoints of the segments t X (the rst endpoint of each segment that we encounter as we 0 in clockwise direction), and let P 00 be the set of clockwise endpoints. We want to prove that either P 0 or P 00 is a piercing set for Q 0. Any square in Q 0 containing the upper right vertex of R 0 must intersect t T and t R ; more precisely, it must contain the counterclockwise endpoint of t R and the clockwise endpoint of t T. In other words, such a square is pierced by both P 0 and P 00. More generally speaking, a square containing a vertex of the location domain is pierced by both P 0 and P 00. Any square q in Q 0 disjoint from the vertices of R 0 must intersect two opposite sides of R 0 in order to meet two of the segments t X. Note that if q intersects the top and bottom side of R 0, but is disjoint from the vertices, then those sides must have length exceeding one and so no square in Q 0 can intersect both the left and right side of R 0 (because all squares are translates of a unit square). So, without loss of generality, we may assume that all squares disjoint from the vertices intersect the top and bottom sides of R 0. The segments t X have length at most one. Hence it is not possible for a square in Q 0 to intersect t T (and t B ) without containing one of its endpoints. If a square contains the counterclockwise endpoint of one of the two segments, and the clockwise endpoint of the other segment, then it is pierced by both P 0 and P 00. What is left are squares that only contain the clockwise endpoints of t T and t B, and squares that only contain the counterclockwise endpoints of t T and t B. If only one of the two situations occurs, then P 00 (or P 0, respectively) pierces all squares. Simultaneous occurrence of both situations, however, is impossible: A square q of the rst type has the counterclockwise endpoint of t T to its left, and the counterclockwise endpoint of t B to its right, and no square of unit side length can contain these two points. We have shown that either P 0 or P 00 is a piercing set in situation (C). For the time analysis, it suces to consider the algorithm for deciding 4-pierceability for the case that no axis-parallel line intersects all squares, and there is no piercing set containing a vertex of R 0 { those decisions can be made in linear time, and handling either of these situations can be done in linear time, as noted earlier. Now we simply have to perform operations (i) and (ii) until we end up in one of the situations (A), (B), or (C), when we can decide 4-pierceability in constant time (and produce a piercing set in linear time). In order to execute the operations (i) and (ii) eciently, we sort the intersections of the boundaries of the squares in Q with the sides of R 0 along each such side (there are at most 4n such intersections). Now, whenever we shorten a segment t X, we have to detect those squares which lose contact with t X, or start to contain t X. Any such square must have a side that intersects the part removed from t X. We therefore simply traverse this part, and process each intersection point found there in a straightforward manner. The most expensive part of the procedure is the sorting along the sides of R 0; all other steps can be performed in O(n) time. Note that if the centers of the squares have already been sorted both by their x-coordinates and by their y-coordinates, then the sorting along the sides of R 0 can be done in O(n) time, by merging the (already sorted) sequences of left sides and of right sides (or of top sides and of bottom sides) of the squares. We will use this observation in the 4-center algorithm, given below. We thus have: Theorem 2.3 (a) The 4-piercing problem for n translates of a square can be solved in O(n log n) time. (b) If the centers of the squares are presorted by their x- coordinates and by their y-coordinates, then 4-pierceability can be decided in O(n) time piercing of rectangles We are given a collection R = fr 1; : : : ; r ng of n axis-parallel rectangles in the plane, and we wish to determine whether R can be pierced by four points. Again, as in the preceding subsection, we may restrict ourselves to the situation that all four piercing points lie on the boundary of the location domain, each lying in the relative interior of a distinct side. This case is handled as follows. Let s denote the top side of R 0, and let t denote the intersection of s with the rectangle whose bottom side lies on the line `T. Let I j = t \ r j, for j = 1; : : : ; n. The endpoints of the intervals I j partition t into at most 2n 1 `atomic' intervals. We iterate through these intervals from left to right, and attempt to place the top piercing point p T in each of them. For an atomic interval J, the set R J of rectangles of R that do not contain p T remains unchanged as p T varies within J. When we pass from J to the next interval J 0, the set R J 0 diers from R J by a single rectangle being added or removed. For each interval J we check whether R J is 3-pierceable. If this is true for at least one interval J, then R is 4-pierceable; otherwise R is not 4-pierceable. We next describe a dynamic data structure on the rectangles in R J, using which we can determine whether R J is 3-pierceable in O(log 3 n) time; the structure can also be updated in O(log 3 n) time when a rectangle is added to or is removed from R J. Recalling the algorithm for testing for 4

5 3-pierceability, we see that the data structure has to support an ecient implementation of two main operations: (a) For a given pre-stored (`canonical') subset of rectangles of R, nd the corresponding lines `L, `R, `T, `B. (b) For a given pre-stored subset R 0 of rectangles of R and for a query point v, nd the set R 0 v of rectangles of R 0 that do not contain v. In a single step of the algorithm, both operations will be performed on a polylogarithmic number of canonical subsets, organized in a three-level structure (described in detail shortly), whose union is equal to a specic subset R. It is important to observe that both operations (a) and (b) are decomposable, in the sense that the output for R can be easily obtained from the outputs for the canonical subsets of R, in time proportional to the number of subsets: For (a), one simply has to take the leftmost of all the lines `L produced for each canonical subset, and symmetrically for the other three lines. The output of (b) for R is simply the union of the outputs for the canonical subsets of R. To perform both (a) and (b) on a canonical set R 0, we prepare four balanced binary search trees, storing, respectively, the left, right, top, and bottom edges of the rectangles of R 0, sorted by their x-coordinates (for the rst two trees) or by their y-coordinates (for the last two trees). Each node u of each of these trees represents a canonical subset R 0 u of R 0, consisting of all rectangles stored at the leaves of the subtree rooted at u. Unless we are at the bottommost (third) level of the structure, we construct, in the next deeper level of the structure, a similar structure for each of the sets R 0 u. Performing an operation of type (a) is easy: simply pick up the rst or last leaf of each tree, as appropriate, and use the corresponding rectangle sides to construct the desired lines. Performing an operation of type (b) is also easy. Suppose the query point v has coordinates (v x; v y). Search with v x in the rst two trees, and with v y in the last two trees. In the rst tree, obtain all rectangles whose left side lies in the halfplane x > v x, as the disjoint union of O(log n) subtrees. Apply symmetric procedures to the three other trees. In total, we obtain the output to (b) as the (not necessarily disjoint) union of O(log n) canonical subsets (that is, subtrees of the four trees). In order to facilitate simple and ecient updating of the structure, we use a slightly modied variant, in the spirit of the structure in [32]. We give details in the full version, and show that each insertion or deletion can be performed in O(log 3 n) time. We can now describe the full algorithm: (i) Construct the rectangle R 0 and obtain the partition of the top interval t, as dened above, into up to 2n 1 atomic intervals. (ii) Iterate over these intervals from left to right. For each interval J, maintain the set R J of rectangles of R not containing J. Initialize the data structure with the set of rectangles not containing the left endpoint of t. (iii) Let R 0(J) denote the location domain for R J. It is easily seen that the lines incident to the left, right and bottom sides of R 0(J) are the same lines `L, `R, `B dening R 0, and only the top side of R 0(J) changes (assuming general position, it is now lower than `T ). Find the new top side (an operation of type (a)). (iv) It is easily seen from our assumptions on the location of the piercing points that one of the three piercing points of R J, if they exist, can be assumed to be one of the two top vertices of R 0(J). We attempt to place the second piercing point at each of these vertices. Let v be that vertex, and, without loss of generality, assume it is the top-left vertex of R 0(J). (v) We compute the set R (J;v) of all rectangles in R J that do not contain v; this is an operation of type (b), and its output consists of O(log n) canonical subsets, whose union is R (J;v). We need to test whether R J;v is 2-pierceable. Again, our assumptions on the piercing points are easily seen to imply that the two piercing points can be assumed to be the top-right vertex and the bottom-left vertex of the corresponding location domain R 0(J; v). It is also easily veried that the bottom and right edges of R 0(J; v) lie on the same lines `B, `R as the corresponding sides of the original R 0. (vi) We nd the left side of R 0(J; v). This is done by computing the leftmost right edge of each of the canonical subsets produced in step (v) above, accessing the corresponding trees in the second level of our data structure, and by nding the leftmost of those output edges. In the same manner we nd the top side of R 0(J; v). The total cost of this step is O(log 2 n). Let w and z denote, respectively, the top-right vertex and the bottom-left vertex of R 0(J; v). (vii) We next determine whether R (J;v) is 2-pierceable by the points w and z. This is done in a manner similar to that used in the preceding steps, but by accessing the third level of the structure; we omit the description due to lack of space. The total cost of this step is easily seen to be O(log 3 n). (viii) If R J has been determined not to be 3-pierceable, we move to the next atomic interval J 0 of t. We update our data structure with the insertion or deletion of the rectangle by which R J and R J 0 dier, and repeat the above steps to J 0. As mentioned above, the cost of the update is O(log 3 n). (ix) If none of the R J's is found to be 3-pierceable, we conclude that R is not 4-pierceable. The overall running time of the algorithm is easily seen to be O(n log 3 n). Hence we have: Theorem 2.4 The 4-piercing problem for n axis-parallel rectangles can be solved in O(n log 3 n) time piercing Let R be a collection of n axis-parallel rectangles, as above. We want to determine whether R can be pierced by ve points. Let R 0 denote the location domain of R as dened above. Arguing as in the preceding subsections, we may assume that one of the following situations occurs: (i) One of the piercing points lies at a vertex of R 0. (ii) The ve piercing points all lie on the boundary of R 0, but none of them lies at a vertex. Each side of R 0 contains at least one point (and one side contains two points). (iii) Four of the piercing points lie on the boundary of R 0, with one point lying in the relative interior of each side, and the fth point lies in the interior of R 0. 5

6 (i) (ii) (iii) Figure 2: Guessing the bottom piercing point (in cases (i,ii)) or the top piercing point (in cases (ii,iii)) causes one of the 4 remaining piercing points to lie at a vertex of the location domain R 0 (J). Testing for case (i) is easy: We try each of the four vertices of R 0 as the rst piercing point, nd the set of rectangles not containing that vertex, and test whether this set is 4-pierceable, using the preceding algorithm. This takes O(n log 3 n) time. To test for case (ii), we guess a side s of R 0 that contains just one piercing point, say it is the top side, and apply a procedure similar to that given for the 4-piercing problem. That is, we construct the interval t and its partition into atomic subintervals, as above, and iterate over these subintervals from left to right, maintaining the set R J of rectangles not containing the current interval J. It is easy to check that one of the four remaining piercing points must lie at one of the two top vertices of R 0(J), the location domain for the set R J. We compute R 0(J) and attempt to place the second piercing point at either of its top vertices, call it v. We nd the set R (J;v) of those rectangles of R J that do not contain v, and test whether this set is 3-pierceable, following the procedure described in the preceding section. The data structure that we need here is almost identical to that used above, except that now it has four levels instead of three. Omitting the easy missing details, we obtain a procedure that runs in O(n log 4 n) time. To test for case (iii), let q be the piercing point lying inside R 0. Either at least one of the piercing points on the left and right sides of R 0 lies above q or at least one of these points lies below q. See Figure 2. Suppose that one of them lies above q. We then `guess' the piercing point lying on the top side of R 0, using the interval t and its partition into atomic subintervals, as above. For each atomic interval J, we maintain the set R J of rectangles not containing J, and observe that, in the assumed conguration, one of the four piercing points of R J, if they exist, must be a (top) vertex of R 0(J). This is because R 0(J) diers from R 0 only by its top side, which is lower, and must pass through one of the two piercing points lying on the left and right sides of R 0, because the highest of these two points lies above q, by assumption. It therefore suces to test whether R J is 4-pierceable, with one piercing point lying at a vertex of R 0(J). This can be tested as in case (ii) above, implying that the testing for case (iii) can also be done in O(n log 4 n) time. Hence we obtain: Theorem 2.5 The 5-piercing problem for a set of n axisparallel rectangles can be solved in O(n log 4 n) time. Remark. The above approach fails for the 6-piercing problem. One reason is that two of the piercing points might lie inside R 0 in such a way that, no matter which of the four border piercing points we eliminate, the resulting 5-piercing subproblem need not have a piercing point at a vertex of the associated location domain. In this case we do not know how to test for this 5-pierceability in polylogarithmic time. The best algorithm for 6-pierceability that we can design takes near quadratic time (it guesses simultaneously two piercing points on the boundary of R 0). We do not know whether this problem can be solved in subquadratic time. Remark. Extending the last observation, one can easily show that the general rectilinear p-piercing problem, for p 5, can be solved in time O(n p 4 log 5 n). 3 Rectilinear p-center Problems We choose the following set-up of the problem: Let R be a set of n compact convex regions with nonempty interior, where every region r 2 R is assigned a scaling point c r in its interior. For r 2 R and a real number 0, let r() be the homothetic copy of r obtained by scaling r by the factor about c r (i.e. r() = fc r + (a c r) j a 2 rg). Finally, R() = fr() j r 2 Rg. The p-center problem for R asks for R := minf j R() is p pierceableg : If R is a set of translates of a square and the scaling points are the respective centers, then we talk about the (standard) rectilinear p-center problem. If the squares are still axisparallel but of possibly dierent sizes (and again the scaling points are the centers), then we have the weighted rectilinear p-center problem, and if R is a set of arbitrary axis-parallel rectangles (and the scaling points are also arbitrary), then we face the general rectilinear p-center problem. 3.1 General rectilinear 2- and 3-center problems Given a set R of axis-parallel rectangles with scaling points, we want to determine 00 R (and 000 R), the smallest for which R() is 2-pierceable (3-pierceable, respectively). We will use two tools for establishing a linear time bound, the LP-type framework and Helly-type results, which we review rst. LP-type problems. An LP-type problem is a pair (H; w) where H is a nite set (whose elements are called constraints), and w is a mapping from 2 H into some totally ordered set, so that the following conditions are satised: (Monotonicity) For any F; G with F G H, we have w(f ) w(g). (Locality) For any F G H with w(f ) = w(g) and any h 2 H, w(g) < w(g [ fhg) implies that also w(f ) < w(f [ fhg). A basis B is a set of constraints with w(b 0 ) < w(b) for all proper subsets B 0 of B. B is a basis of G, for G H, if B G is a basis and w(b) = w(g). 6

7 LP-type problems serve as a framework to solve certain optimization problems. Solving an LP-type problem (H; w) means to determine a basis of H, based on the following basic operations. (Violation test) For a constraint h and a basis B, test whether h is violated by B, i.e. whether w(b) < w(b [ fhg). (Basis computation) For a constraint h and a basis B, compute a basis of B [ fhg. For the eciency of algorithms solving LP-type problems, the following parameter is crucial: The maximum cardinality of any basis is called the combinatorial dimension of (H; w). Lemma 3.1 ([26]) An LP-type problem of combinatorial dimension d with n > d constraints can be solved by a randomized algorithm with an expected number of at most 2 d+3 (n d) basic operations. Helly-type results for rectilinear p-piercing. For p 1, let h p;d be the smallest integer such that a nite set of axis-parallel boxes in d dimensions is p-pierceable, if and only if any h p;d (or fewer) of the boxes are p-pierceable. Lemma 3.2 [6] (cf [9], Theorem 5.5) (a) h p;1 = p + 1, for any p 1. (b) h 1;2 = 2, h 2;2 = 5, h 3;2 = 16, and h p;2 is undened for p 4. (c) For d 3, one has h 1;d = 2, h 2;d = 3d if d is even and h 2;d = 3d 1 if d is odd, and h p;d is undened for p 3. For our purpose, this yields the following corollary (whose easy proof is omitted in this abstract). Corollary 3.3 If R is a set of axis-parallel rectangles with scaling points, then there exists a subset G 2 of at most 5 rectangles such that 00 R = 00 G 2 and there is a subset G 3 of at most 16 rectangles such that 000 R = 000 G 3. The relation between nite Helly numbers and LP-type problems of constant combinatorial dimension has been worked out in [3, 4]. Roughly speaking, as shown there, constant combinatorial dimension implies a nite Helly number property, but not vice versa! The p-center problem in one dimension as an LPtype problem. Before considering the 2-dimensional case, let us comment on the 1-dimensional p-center problem. A fairly involved technique of Frederickson [12] gives a linear-time solution, provided that the points are already sorted along the real line (this result actually works for arbitrary trees). However, it follows from Lemma 3.2(a), combined with the machinery of [3, 4], that the 1-dimensional p-center problem is an LP-type problem, for any p (see below for a similar analysis in two dimensions), and thus can be solved in randomized expected O(n) time, for any xed p. In this bound, though, the combinatorial dimension is O(p), so the constant of proportionality depends `subexponentially' on p (see [26]), so Frederickson's solution is far better when p is large. The 2-center problem as an LP-type problem. (Recall that the 2-center problem already has a linear-time solution [8]. It is treated here both to highlight the use of the LP-type machinery to solve this problem, and to serve as a basis for the solution of the 3-center problem.) If we simply dene w(g) := 00 G for G R, then the system (R; w) is not LP-type because locality may be violated (this is discussed in more detail in the full version). We need to dene a unique canonical 2-piercing set of a set of rectangles, provided it is 2-pierceable, and use this canonical set as part of the value of w. Recall the denition, given in the beginning of Section 2, of the lines `X, for X = L; R; T; B, for a nonempty set R of axis-parallel rectangles. Dene the vertex v XY as the intersection of `X and `Y for X = L; R and Y = B; T. Given a set R of axis-parallel rectangles, we dene six 2-piercing candidate sets by C (0) = ;; C (1) = fv RT g; C (2) = fv LT ; v RT g; C (3) = fv RB ; v RT g; C (4) = fv LB ; v RT g; C (5) = fv LT ; v RB g : Suppose that R is 2-pierceable. If R is empty then C (0) pierces R. If R is 1-pierceable, then C (1) pierces R. If there is a horizontal line intersecting all rectangles, then C (2) pierces R, and if a vertical line intersects all rectangles, then C (3) pierces R. If no axis-parallel line intersects all rectangles, then the location domain exists, and C (4) or C (5) is piercing. We summarize in a lemma. Lemma 3.4 If R is 2-pierceable, then one of the 2-piercing candidate sets pierces R. The canonical 2-piercing set P R of R is the 2-piercing candidate of smallest index that pierces R, and the index of this candidate is called the characteristic 2-piercing index R of R. If R is not 2-pierceable, then we set R = 6 and P R =?, with? representing a nominal undened value. Now let R be a set of axis-parallel rectangles with scaling points assigned. For G R, we dene w(g) as the tuple ( 00 G; x L ; x R ; y B ; y T ; G( 00 ), where G ) x L, x R are the x-coordinates of `L, `R, and y B, y T are the y-coordinates of `B, `T, as dened for the scaled set G( 00 G). Note that w(g) describes a unique candidate piercing set, including the exact coordinates of the piercing point(s). The ordering on such tuples is lexicographic, with the rst entry most signicant. We have to show monotonicity of w. As for the rst component, it is clear that 00 F 00 G for F G R. The following lemma claries that adding a rectangle to a set G cannot decrease its characteristic 2-piercing index. Lemma 3.5 Let R be a 2-pierceable set of axis-parallel rectangles. (0) R = 0 i R is empty. (1) R = 1 i R is nonempty and 1-pierceable. (2) R = 2 i R is not 1-pierceable, and there is a horizontal line intersecting all rectangles. (3) R = 3 i R is not 1-pierceable, and there is a vertical line intersecting all rectangles. (4) R = 4 i there is no axis-parallel line intersecting all rectangles, and C (4) is piercing. (5) R = 5 i there is no axis-parallel line intersecting all rectangles, and C (4) is not piercing. 7

8 The conditions for (2) and (3) are disjoint because, if there is both a vertical and a horizontal line intersecting all rectangles, then the set is 1-pierceable. A short scan through the items in the lemma shows that adding a rectangle cannot decrease the characteristic 2- piercing index, with the step from (5) to (4) being the only non-trivial case. To see also this case, assume that we add a rectangle to R with R = 5, and the resulting set ^R is (4) pierceable by its fourth candidate ^C = f^v LB ; ^v RT g. Compare the points with the fourth candidate C (4) = fv LB ; v RT g of R. ^v LB must lie in the third quadrant anchored at v LB, and thus moving from ^v LB to v LB we cannot exit a rectangle in R. Similarly, v RT pierces all rectangles in R which are pierced by ^v RT (4). So if ^C is piercing ^R (and thus R), then C (4) is piercing R, contradicting the assumption that R = 5. So the rst component in the w-value of a set cannot decrease if a new rectangle is added. The same holds for all the other components, as is easily veried for the next four components, and as follows from the lemma for the last component. We have thus established monotonicity of w. As for locality, consider F G R with w(f) = w(g) = (; x 1; x 2; y 1; y 2; ) and a rectangle r with a scaling point. Note that w(g) < w(g [ frg), i r() is disjoint from the piercing candidate set described by w(g), which is equivalent to the condition w(f) < w(f [ frg). This proves locality. We are left with the task of proving that the combinatorial dimension (R; w) is bounded by a xed constant. That is, we need to bound the number of rectangles in a set G R that determine w(g). At most ve rectangles determine 00 (G). At most four other rectangles may be needed to x the lines `X, for X = L; R; T; B (and thus x the points v XY, for X = L; R and Y = B; T.) If G = i, then we may need up to i 1 additional rectangles to enforce that index (for each 1 j < i we need a rectangle r 2 G, so that r( 00 G) is disjoint from C (j) ). We obtain an upper bound of = 13 on the maximal size of a basis (remember that G( 00 G ) < 6). The actual bound is probably much smaller, since we can `recycle' some of the rectangles in the argument. The two types of basic operations are easy to implement in constant time. Lemma 3.1 implies: Theorem 3.6 The general rectilinear 2-center problem for n rectangles with scaling points can be solved in expected O(n) time by a randomized algorithm. The 3-center problem as an LP-type problem. Given a nonempty 3-pierceable set R of axis-parallel rectangles, let v R be the rst point v in the sequence (v RT ; v RB ; v LT ; v LB ) such that the set of rectangles in R disjoint from v, denoted by R v, is 2-pierceable (v R exists; see Subsection 2.1). We put R = i, if v R's occurrence in this sequence is in position i, for 1 i 4. We extend this notion to ; = 0, v ; =?, and for R not 3-pierceable, R = 5, v R =?. Let R be a set of axis-parallel rectangles with scaling points. For G R, we dene u(g) = ( 000 G ; x L ; x R ; y B ; y T ; G 000 ; ~w(g 000 v G 000)); where G 000 = G( 000 G ), where x L, x R, y B, and y T are as dened above, for the scaled set G 000, and where ~w is the tuple w without its rst component (here there is no need to specify another scaling factor). As before, one can show that u(g) describes a unique candidate piercing set. Ordering on tuples (; x 1; x 2; y 1; y 2; ; ~w) is again lexicographic from left to right. Monotonicity follows easily, as in the 2-center case. Locality follows again, because u(g) encodes an explicit piercing set which determines whether u(g [ frg) > u(g) for some r (this happens i r( 000 G ) is not pierced by that set). For the combinatorial dimension, we have to nd a bound on the number of rectangles in a set G necessary for determining u(g): 16 rectangles enforce 000 G ; 4 rectangles x the lines `X; for each = 2; 3; 4, we need up to 5 rectangles for each preceding vertex v XY, to show that the rectangles disjoint from v XY are not 2-pierceable, thus enforcing the value of. Finally, we need 4+4 more rectangles to enforce the value of ~w (see the previous analysis). This gives a bound of = 43 (which, again, may be improved by a more careful analysis). It requires an actual implementation to decide whether the randomized algorithm derived from the LP-type framework does indeed have an impractical constant of proportionality in the linear time bound (we expect that this is not the case). At this point we have the following theoretical result. Theorem 3.7 The general rectilinear 3-center problem for n rectangles with scaling points can be solved in expected O(n) time by a randomized algorithm. The algorithms in Theorems 3.6 and 3.7 can be derandomized at the cost of an increase in the constant of proportionality only; this is done using the technique of [5]. (Note that this technique requires some extra condition beyond the LP-type axioms: For each basis B, let G B be the set of all constraints not violated by B. Then we require that the set system fg Bg B have nite VC-dimension. It is easily veried that this condition holds for the above problems.) Remark. One can apply Lemma 3.2(c), using a machinery similar to that above, to obtain a linear-time randomized algorithm for the general rectilinear 2-center problem in any dimension d. See also a related piercing result in [21]. 3.2 Rectilinear 4- and 5-center problems Let S be a set of n points in the plane. We want to nd the smallest, so that S can be covered by the union of four (or ve) axis-parallel squares of side length. We solve this problem by providing a general scheme for transforming a p-piercing algorithm for translates of squares to a rectilinear p-center algorithm. It is based on the matrix-searching technique of Frederickson and Johnson [13, 14, 15] (a previous recent application of that technique can be found in [17]). Specically, we observe that if S can be covered by the union of p squares of size, then it can also be covered by the union of p squares of size smaller than, unless is equal to the dierence between either the x-coordinates or the y-coordinates of a pair of points in S. 8

9 We therefore consider two nn matrices X and Y, dened as follows. Let (x 1; : : : ; x n) be the sequence of x-coordinates of the points of S, sorted in increasing order. Then X ij = x j x i if j > i and X ij = 0 otherwise. The matrix Y is dened symmetrically by the sorted y-coordinates of the points of S. We note that both matrices are monotone, in the sense that each row (resp. each column) is a monotone nondecreasing (resp. nonincreasing) sequence, and that the optimal is an entry of one of these matrices. Moreover, comparing with another can be done by applying a p-piercing algorithm to the set Q() = fs + Q j s 2 Sg, where Q is an axis-parallel square of size 1, centered at the origin. That is, Q() is p-pierceable if and only if. We can therefore apply the matrix searching technique of Frederickson and Johnson, as described in [13, 14, 15]. It nds the optimal by making only O(log n) calls to the p-piercing decision procedure. That is, we have shown: Theorem 3.8 If the p-piercing problem for n translates of a square can be solved in time t p(n), then the rectilinear p- center problem can be solved in O(t p(n) log n) time. Based on Theorems 2.3(b) and 2.5, we get (the proof of the lower bound will be given in the full version of the paper): Corollary 3.9 The rectilinear 4-center problem can be solved in time O(n log n), which is worst-case optimal, and the rectilinear 5-center problem can be solved in time O(n log 5 n). Remark. The Frederickson-Johnson technique fails in the weighted case, where we need to apply full-edged parametric searching [29] (see also [1, 2]). This results in O(n polylog n) solutions for both the weighted (or general) rectilinear 4- and 5-center problems. Details are given in the full version. 4 Polygonal 2-Piercing and 2- Center Problems In this section we consider the 2-piercing and 2-center problems for convex polygons. In the 2-center problem, we are given a set S of n points in the plane, and a convex c-gon P, and we want to cover S with two homothetic copies of P whose maximum size is as small as possible. An equivalent formulation of the problem is as follows. Let P ~ be the reected image of P through the origin. We want to nd the smallest scaling factor for which the collection P() = fs+ P ~ j s 2 Sg of isothetic polygons is 2-pierceable. As a matter of fact, we consider the following more general 2-piercing problem: A collection Q of convex polygons is called c-oriented if the orientations of the edges of each Q 2 Q belong to a xed set of c orientations. (We will also allow degenerate cases, in which some members of Q may have fewer than c edges; we treat these cases by regarding each member of Q as a convex c-gon, where some of its sides have zero length.) Let Q = fq 1; : : : ; Q ng be a collection of c-oriented convex polygons. We want to determine whether Q is 2-pierceable. Unlike the case where the given orientations come from the Figure 3: The arrangement A(L) for a 2-pierceable set of 4-oriented quadrilaterals sides of a square (which is the rectilinear 2-piercing problem treated earlier), there is no general Helly-type result for 2-piercing of Q (such a result was conjectured by Danzer and Grunbaum [6] and recently refuted by Katchalski and Nashtir [20]). However, such a Helly-type result was established in [20] for the case of homothetic triangles: if any 9 (or fewer) triangles in Q are 2-pierceable then Q is 2-pierceable. This result implies that the 2-center problem for homothets of some triangle can be solved in expected linear time, using the machinery of LP-type problems. However, our analysis will imply a simpler (and deterministic) linear-time solution for triangles. For each edge orientation, let L be the directed line at orientation that satises the following properties: L passes through an edge e of some polygon Q 2 Q (including degenerate edges, as above), so that Q lies to the left of L. No edge at orientation of any polygon in Q is contained in the open halfplane to the left of L. Let L be the resulting collection of c lines, and let A(L) denote their arrangement. See Figure 3. Note that if Q can be pierced by two points a, b, then the closed left halfplane bounded by each of the lines L must contain either a or b (or else the corresponding polygon Q will not be pierced). Lemma 4.1 If Q can be pierced by two points, then it can be pierced by a pair of points lying on the lines of L. For Q a collection of homothetic triangles or 4-oriented trapezoids, we may assume that one of the piercing points lies at a vertex of A(L). Proof: Let a and b be two points that pierce Q. We will show that a can be moved to an appropriate edge g of A(L), on the boundary of the face containing a, so that, during this motion, we do not exit any polygon in Q. A similar property also holds for b, and this clearly implies the assertion of the lemma. The following claim is immediate from the denitions: Claim: (i) Suppose that a lies in the left halfplane of some line L. If a moves arbitrarily within this halfplane, it cannot exit any polygon of Q through an edge at orientation. (ii) Suppose that a lies in the right halfplane of some line L. 9

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD CAR-TR-728 CS-TR-3326 UMIACS-TR-94-92 Samir Khuller Department of Computer Science Institute for Advanced Computer Studies University of Maryland College Park, MD 20742-3255 Localization in Graphs Azriel

More information

Quasi-Planar Graphs Have a Linear Number of Edges Pankaj K. Agarwal y Boris Aronov z Janos Pach x Richard Pollack { Micha Sharir k January 2, 1996 Abs

Quasi-Planar Graphs Have a Linear Number of Edges Pankaj K. Agarwal y Boris Aronov z Janos Pach x Richard Pollack { Micha Sharir k January 2, 1996 Abs Quasi-Planar Graphs Have a Linear Number of Edges Pankaj K. Agarwal y Boris Aronov z Janos Pach x Richard Pollack { Micha Sharir k January 2, 1996 Abstract A graph is called quasi-planar if it can be drawn

More information

Motion Planning for a Convex Polygon in a Polygonal Environment Pankaj K. Agarwal y Boris Aronov z Micha Sharir x August 30, 1997 Abstract We study th

Motion Planning for a Convex Polygon in a Polygonal Environment Pankaj K. Agarwal y Boris Aronov z Micha Sharir x August 30, 1997 Abstract We study th Motion Planning for a Convex Polygon in a Polygonal Environment Pankaj K. Agarwal y Boris Aronov z Micha Sharir x August 30, 1997 Abstract We study the motion-planning problem for a convex m-gon P in a

More information

Simplicial Cells in Arrangements of Hyperplanes

Simplicial Cells in Arrangements of Hyperplanes Simplicial Cells in Arrangements of Hyperplanes Christoph Dätwyler 05.01.2013 This paper is a report written due to the authors presentation of a paper written by Shannon [1] in 1977. The presentation

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

On the number of distinct directions of planes determined by n points in R 3

On the number of distinct directions of planes determined by n points in R 3 On the number of distinct directions of planes determined by n points in R 3 Rom Pinchasi August 27, 2007 Abstract We show that any set of n points in R 3, that is not contained in a plane, determines

More information

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects A technique for adding range restrictions to generalized searching problems Prosenjit Gupta Ravi Janardan y Michiel Smid z August 30, 1996 Abstract In a generalized searching problem, a set S of n colored

More information

Lecture 3: Art Gallery Problems and Polygon Triangulation

Lecture 3: Art Gallery Problems and Polygon Triangulation EECS 396/496: Computational Geometry Fall 2017 Lecture 3: Art Gallery Problems and Polygon Triangulation Lecturer: Huck Bennett In this lecture, we study the problem of guarding an art gallery (specified

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

arxiv: v1 [cs.cc] 30 Jun 2017

arxiv: v1 [cs.cc] 30 Jun 2017 Hamiltonicity is Hard in Thin or Polygonal Grid Graphs, but Easy in Thin Polygonal Grid Graphs Erik D. Demaine Mikhail Rudoy arxiv:1706.10046v1 [cs.cc] 30 Jun 2017 Abstract In 2007, Arkin et al. [3] initiated

More information

Parameterized Complexity of Independence and Domination on Geometric Graphs

Parameterized Complexity of Independence and Domination on Geometric Graphs Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de

More information

Crossing Families. Abstract

Crossing Families. Abstract Crossing Families Boris Aronov 1, Paul Erdős 2, Wayne Goddard 3, Daniel J. Kleitman 3, Michael Klugerman 3, János Pach 2,4, Leonard J. Schulman 3 Abstract Given a set of points in the plane, a crossing

More information

Connected Components of Underlying Graphs of Halving Lines

Connected Components of Underlying Graphs of Halving Lines arxiv:1304.5658v1 [math.co] 20 Apr 2013 Connected Components of Underlying Graphs of Halving Lines Tanya Khovanova MIT November 5, 2018 Abstract Dai Yang MIT In this paper we discuss the connected components

More information

CMSC 754 Computational Geometry 1

CMSC 754 Computational Geometry 1 CMSC 754 Computational Geometry 1 David M. Mount Department of Computer Science University of Maryland Fall 2005 1 Copyright, David M. Mount, 2005, Dept. of Computer Science, University of Maryland, College

More information

Computational Geometry

Computational Geometry Motivation Motivation Polygons and visibility Visibility in polygons Triangulation Proof of the Art gallery theorem Two points in a simple polygon can see each other if their connecting line segment is

More information

Computational Geometry

Computational Geometry Windowing queries Windowing Windowing queries Zoom in; re-center and zoom in; select by outlining Windowing Windowing queries Windowing Windowing queries Given a set of n axis-parallel line segments, preprocess

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

On Planar Intersection Graphs with Forbidden Subgraphs

On Planar Intersection Graphs with Forbidden Subgraphs On Planar Intersection Graphs with Forbidden Subgraphs János Pach Micha Sharir June 13, 2006 Abstract Let C be a family of n compact connected sets in the plane, whose intersection graph G(C) has no complete

More information

Eulerian disjoint paths problem in grid graphs is NP-complete

Eulerian disjoint paths problem in grid graphs is NP-complete Discrete Applied Mathematics 143 (2004) 336 341 Notes Eulerian disjoint paths problem in grid graphs is NP-complete Daniel Marx www.elsevier.com/locate/dam Department of Computer Science and Information

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Basic Properties The Definition of Catalan Numbers

Basic Properties The Definition of Catalan Numbers 1 Basic Properties 1.1. The Definition of Catalan Numbers There are many equivalent ways to define Catalan numbers. In fact, the main focus of this monograph is the myriad combinatorial interpretations

More information

On Computing the Centroid of the Vertices of an Arrangement and Related Problems

On Computing the Centroid of the Vertices of an Arrangement and Related Problems On Computing the Centroid of the Vertices of an Arrangement and Related Problems Deepak Ajwani, Saurabh Ray, Raimund Seidel, and Hans Raj Tiwary Max-Planck-Institut für Informatik, Saarbrücken, Germany

More information

(for all > 0). In particular these bounds prove that none of the extent measures mentioned can change combinatorially more than O(n 2+ ) times. A quad

(for all > 0). In particular these bounds prove that none of the extent measures mentioned can change combinatorially more than O(n 2+ ) times. A quad Submitted to the 1997 ACM Symposium on Computational Geometry Maintaining the Extent of a Moving Point Set Pankaj K. Agarwal Duke University Leonidas J. Guibas y Stanford University John Hershberger Mentor

More information

SPERNER S LEMMA MOOR XU

SPERNER S LEMMA MOOR XU SPERNER S LEMMA MOOR XU Abstract. Is it possible to dissect a square into an odd number of triangles of equal area? This question was first answered by Paul Monsky in 970, and the solution requires elements

More information

Solutions to problem set 1

Solutions to problem set 1 Massachusetts Institute of Technology Handout 5 6.838: Geometric Computation October 4, 2001 Professors Piotr Indyk and Seth Teller Solutions to problem set 1 (mostly taken from the solution set of Jan

More information

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Master Thesis Patrick Schnider July 25, 2015 Advisors: Prof. Dr. Emo Welzl, Manuel Wettstein Department of

More information

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

More information

Deformable Polygon Representation and Near-Mincuts

Deformable Polygon Representation and Near-Mincuts BOLYAI SOCIETY Building Bridges MATHEMATICAL STUDIES, 19 pp. 1 33. Deformable Polygon Representation and Near-Mincuts András A. Benczúr and Michel X. Goemans We derive a necessary and sufficient condition

More information

HW Graph Theory SOLUTIONS (hbovik) - Q

HW Graph Theory SOLUTIONS (hbovik) - Q 1, Diestel 9.3: An arithmetic progression is an increasing sequence of numbers of the form a, a+d, a+ d, a + 3d.... Van der Waerden s theorem says that no matter how we partition the natural numbers into

More information

Exercise set 2 Solutions

Exercise set 2 Solutions Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T

More information

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.

More information

1 Introduction The concept of graph spanners has been studied in several recent papers in the context of communication networks, distributed computing

1 Introduction The concept of graph spanners has been studied in several recent papers in the context of communication networks, distributed computing On the Hardness of Approximating Spanners Guy Kortsarz June 1, 1999 Abstract A k spanner of a connected graph G = (V; E) is a subgraph G 0 consisting of all the vertices of V and a subset of the edges,

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

1 The range query problem

1 The range query problem CS268: Geometric Algorithms Handout #12 Design and Analysis Original Handout #12 Stanford University Thursday, 19 May 1994 Original Lecture #12: Thursday, May 19, 1994 Topics: Range Searching with Partition

More information

Average case analysis of dynamic geometric optimization

Average case analysis of dynamic geometric optimization Average case analysis of dynamic geometric optimization David Eppstein Department of Information and Computer Science University of California, Irvine, CA 92717 May 19, 1995 Abstract We maintain the maximum

More information

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994)

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994) Discrete Comput Geom 12:29-34 (1994) G 6i try 9 1994 Springer-Verlag New York Inc. On the Number of Minimal 1-Steiner Trees* B. Aronov, 1 M. Bern, 2 and D. Eppstein 3 Computer Science Department, Polytechnic

More information

Linear Data Structures for Fast Ray-Shooting amidst Convex Polyhedra

Linear Data Structures for Fast Ray-Shooting amidst Convex Polyhedra Linear Data Structures for Fast Ray-Shooting amidst Convex Polyhedra Haim Kaplan, Natan Rubin, and Micha Sharir School of Computer Science, Tel Aviv University, Tel Aviv, Israel {haimk,rubinnat,michas}@post.tau.ac.il

More information

2 Solution of Homework

2 Solution of Homework Math 3181 Name: Dr. Franz Rothe February 6, 2014 All3181\3181_spr14h2.tex Homework has to be turned in this handout. The homework can be done in groups up to three due February 11/12 2 Solution of Homework

More information

The problem of minimizing the elimination tree height for general graphs is N P-hard. However, there exist classes of graphs for which the problem can

The problem of minimizing the elimination tree height for general graphs is N P-hard. However, there exist classes of graphs for which the problem can A Simple Cubic Algorithm for Computing Minimum Height Elimination Trees for Interval Graphs Bengt Aspvall, Pinar Heggernes, Jan Arne Telle Department of Informatics, University of Bergen N{5020 Bergen,

More information

Bipartite Roots of Graphs

Bipartite Roots of Graphs Bipartite Roots of Graphs Lap Chi Lau Department of Computer Science University of Toronto Graph H is a root of graph G if there exists a positive integer k such that x and y are adjacent in G if and only

More information

An Improved Bound for k-sets in Three Dimensions. November 30, Abstract

An Improved Bound for k-sets in Three Dimensions. November 30, Abstract An Improved Bound for k-sets in Three Dimensions Micha Sharir Shakhar Smorodinsky y Gabor Tardos z November 30, 1999 Abstract We prove that the maximum number of k-sets in a set S of n points in IR 3 is

More information

Largest Placement of One Convex Polygon inside Another. March 16, Abstract

Largest Placement of One Convex Polygon inside Another. March 16, Abstract Largest Placement of One Convex Polygon inside Another Pankaj K. Agarwal y Nina Amenta z Micha Sharir x March 16, 1996 Abstract We show that the largest similar copy of a convex polygon P with m edges

More information

Improved Results on Geometric Hitting Set Problems

Improved Results on Geometric Hitting Set Problems Improved Results on Geometric Hitting Set Problems Nabil H. Mustafa nabil@lums.edu.pk Saurabh Ray saurabh@cs.uni-sb.de Abstract We consider the problem of computing minimum geometric hitting sets in which,

More information

of a set of n straight lines, have been considered. Among them are k-sets in higher dimensions or k-levels of curves in two dimensions and surfaces in

of a set of n straight lines, have been considered. Among them are k-sets in higher dimensions or k-levels of curves in two dimensions and surfaces in Point-sets with few k-sets Helmut Alt? Stefan Felsner Ferran Hurtado y Marc Noy y Abstract A k-set of a nite set S of points in the plane is a subset of cardinality k that can be separated from the rest

More information

Conflict-free Covering

Conflict-free Covering CCCG 05, Kingston, Ontario, August 0, 05 Conflict-free Covering Esther M. Arkin Aritra Banik Paz Carmi Gui Citovsky Matthew J. Katz Joseph S. B. Mitchell Marina Simakov Abstract Let P = {C, C,..., C n

More information

2017 SOLUTIONS (PRELIMINARY VERSION)

2017 SOLUTIONS (PRELIMINARY VERSION) SIMON MARAIS MATHEMATICS COMPETITION 07 SOLUTIONS (PRELIMINARY VERSION) This document will be updated to include alternative solutions provided by contestants, after the competition has been mared. Problem

More information

would be included in is small: to be exact. Thus with probability1, the same partition n+1 n+1 would be produced regardless of whether p is in the inp

would be included in is small: to be exact. Thus with probability1, the same partition n+1 n+1 would be produced regardless of whether p is in the inp 1 Introduction 1.1 Parallel Randomized Algorihtms Using Sampling A fundamental strategy used in designing ecient algorithms is divide-and-conquer, where that input data is partitioned into several subproblems

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

Definition 2 (Projective plane). A projective plane is a class of points, and a class of lines satisfying the axioms:

Definition 2 (Projective plane). A projective plane is a class of points, and a class of lines satisfying the axioms: Math 3181 Name: Dr. Franz Rothe January 30, 2014 All3181\3181_spr14h2.tex Homework has to be turned in this handout. The homework can be done in groups up to three due February 11/12 2 Homework 1 Definition

More information

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra Apex graphs with embeddings of face-width three Bojan Mohar Department of Mathematics University of Ljubljana Jadranska 19, 61111 Ljubljana Slovenia bojan.mohar@uni-lj.si Abstract Aa apex graph is a graph

More information

EXTREME POINTS AND AFFINE EQUIVALENCE

EXTREME POINTS AND AFFINE EQUIVALENCE EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Weak Dynamic Coloring of Planar Graphs

Weak Dynamic Coloring of Planar Graphs Weak Dynamic Coloring of Planar Graphs Caroline Accurso 1,5, Vitaliy Chernyshov 2,5, Leaha Hand 3,5, Sogol Jahanbekam 2,4,5, and Paul Wenger 2 Abstract The k-weak-dynamic number of a graph G is the smallest

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1.

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1. Discrete Comput Geom 18:455 462 (1997) Discrete & Computational Geometry 1997 Springer-Verlag New York Inc. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

arxiv:cs/ v1 [cs.ds] 20 Feb 2003

arxiv:cs/ v1 [cs.ds] 20 Feb 2003 The Traveling Salesman Problem for Cubic Graphs David Eppstein School of Information & Computer Science University of California, Irvine Irvine, CA 92697-3425, USA eppstein@ics.uci.edu arxiv:cs/0302030v1

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu

More information

Enumeration of Full Graphs: Onset of the Asymptotic Region. Department of Mathematics. Massachusetts Institute of Technology. Cambridge, MA 02139

Enumeration of Full Graphs: Onset of the Asymptotic Region. Department of Mathematics. Massachusetts Institute of Technology. Cambridge, MA 02139 Enumeration of Full Graphs: Onset of the Asymptotic Region L. J. Cowen D. J. Kleitman y F. Lasaga D. E. Sussman Department of Mathematics Massachusetts Institute of Technology Cambridge, MA 02139 Abstract

More information

An Efficient Algorithm for 2D Euclidean 2-Center with Outliers

An Efficient Algorithm for 2D Euclidean 2-Center with Outliers An Efficient Algorithm for 2D Euclidean 2-Center with Outliers Pankaj K. Agarwal and Jeff M. Phillips Department of Computer Science, Duke University, Durham, NC 27708 Abstract. For a set P of n points

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu P, NP-Problems Class

More information

Restricted Delivery Problems on a Network. December 17, Abstract

Restricted Delivery Problems on a Network. December 17, Abstract Restricted Delivery Problems on a Network Esther M. Arkin y, Refael Hassin z and Limor Klein x December 17, 1996 Abstract We consider a delivery problem on a network one is given a network in which nodes

More information

CONNECTED SPACES AND HOW TO USE THEM

CONNECTED SPACES AND HOW TO USE THEM CONNECTED SPACES AND HOW TO USE THEM 1. How to prove X is connected Checking that a space X is NOT connected is typically easy: you just have to find two disjoint, non-empty subsets A and B in X, such

More information

10. Line Arrangements Lecture on Monday 2 nd November, 2009 by Michael Homann

10. Line Arrangements Lecture on Monday 2 nd November, 2009 by Michael Homann 10. Line Arrangements Lecture on Monday 2 nd November, 2009 by Michael Homann During the course of this lecture we encountered several situations where it was convenient to assume

More information

Algorithms for an FPGA Switch Module Routing Problem with. Application to Global Routing. Abstract

Algorithms for an FPGA Switch Module Routing Problem with. Application to Global Routing. Abstract Algorithms for an FPGA Switch Module Routing Problem with Application to Global Routing Shashidhar Thakur y Yao-Wen Chang y D. F. Wong y S. Muthukrishnan z Abstract We consider a switch-module-routing

More information

Computational Geometry

Computational Geometry Lecture 1: Introduction and convex hulls Geometry: points, lines,... Geometric objects Geometric relations Combinatorial complexity Computational geometry Plane (two-dimensional), R 2 Space (three-dimensional),

More information

Geometry. Vertical Decomposition of Arrangements of Hyperplanes in Four Dimensions* Discrete Comput Geom 14: (1995)

Geometry. Vertical Decomposition of Arrangements of Hyperplanes in Four Dimensions* Discrete Comput Geom 14: (1995) Discrete Comput Geom 14:113-122 (1995) Discrete & Computational Geometry 9 1995 Springer-Verlag New York Inc. Vertical Decomposition of Arrangements of Hyperplanes in Four Dimensions* L. J. Guibas, 1 D.

More information

Line Arrangement. Chapter 6

Line Arrangement. Chapter 6 Line Arrangement Chapter 6 Line Arrangement Problem: Given a set L of n lines in the plane, compute their arrangement which is a planar subdivision. Line Arrangements Problem: Given a set L of n lines

More information

Rigidity, connectivity and graph decompositions

Rigidity, connectivity and graph decompositions First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

More information

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Pawe l Żyliński Institute of Mathematics University of Gdańsk, 8095 Gdańsk, Poland pz@math.univ.gda.pl Submitted: Sep 9, 005;

More information

Definition 1 (Hand-shake model). A hand shake model is an incidence geometry for which every line has exactly two points.

Definition 1 (Hand-shake model). A hand shake model is an incidence geometry for which every line has exactly two points. Math 3181 Dr. Franz Rothe Name: All3181\3181_spr13t1.tex 1 Solution of Test I Definition 1 (Hand-shake model). A hand shake model is an incidence geometry for which every line has exactly two points. Definition

More information

EXTERNAL VISIBILITY. 1. Definitions and notation. The boundary and interior of

EXTERNAL VISIBILITY. 1. Definitions and notation. The boundary and interior of PACIFIC JOURNAL OF MATHEMATICS Vol. 64, No. 2, 1976 EXTERNAL VISIBILITY EDWIN BUCHMAN AND F. A. VALENTINE It is possible to see any eleven vertices of an opaque solid regular icosahedron from some appropriate

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Tilings of the Euclidean plane

Tilings of the Euclidean plane Tilings of the Euclidean plane Yan Der, Robin, Cécile January 9, 2017 Abstract This document gives a quick overview of a eld of mathematics which lies in the intersection of geometry and algebra : tilings.

More information

Cache-Oblivious Traversals of an Array s Pairs

Cache-Oblivious Traversals of an Array s Pairs Cache-Oblivious Traversals of an Array s Pairs Tobias Johnson May 7, 2007 Abstract Cache-obliviousness is a concept first introduced by Frigo et al. in [1]. We follow their model and develop a cache-oblivious

More information

Linear Data Structures for Fast Ray-Shooting amidst Convex Polyhedra

Linear Data Structures for Fast Ray-Shooting amidst Convex Polyhedra Linear Data Structures for Fast Ray-Shooting amidst Convex Polyhedra Haim Kaplan Natan Rubin Micha Sharir Abstract We consider the problem of ray shooting in a three-dimensional scene consisting of k (possibly

More information

arxiv: v1 [cs.cg] 8 Jan 2018

arxiv: v1 [cs.cg] 8 Jan 2018 Voronoi Diagrams for a Moderate-Sized Point-Set in a Simple Polygon Eunjin Oh Hee-Kap Ahn arxiv:1801.02292v1 [cs.cg] 8 Jan 2018 Abstract Given a set of sites in a simple polygon, a geodesic Voronoi diagram

More information

Ray shooting from convex ranges

Ray shooting from convex ranges Discrete Applied Mathematics 108 (2001) 259 267 Ray shooting from convex ranges Evangelos Kranakis a, Danny Krizanc b, Anil Maheshwari a;, Jorg-Rudiger Sack a, Jorge Urrutia c a School of Computer Science,

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Nesting points in the sphere. Dan Archdeacon. University of Vermont. Feliu Sagols.

Nesting points in the sphere. Dan Archdeacon. University of Vermont.   Feliu Sagols. Nesting points in the sphere Dan Archdeacon Dept. of Computer Science University of Vermont Burlington, VT, USA 05405 e-mail: dan.archdeacon@uvm.edu Feliu Sagols Dept. of Computer Science University of

More information

The Geodesic Integral on Medial Graphs

The Geodesic Integral on Medial Graphs The Geodesic Integral on Medial Graphs Kolya Malkin August 013 We define the geodesic integral defined on paths in the duals of medial graphs on surfaces and use it to study lens elimination and connection

More information

Canonical Forms and Algorithms for Steiner Trees in Uniform Orientation Metrics

Canonical Forms and Algorithms for Steiner Trees in Uniform Orientation Metrics Canonical Forms and Algorithms for Steiner Trees in Uniform Orientation Metrics M. Brazil D.A. Thomas J.F. Weng M. Zachariasen December 13, 2002 Abstract We present some fundamental structural properties

More information

(Refer Slide Time: 00:02:00)

(Refer Slide Time: 00:02:00) Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 18 Polyfill - Scan Conversion of a Polygon Today we will discuss the concepts

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem David Glickenstein November 26, 2008 1 Graph minors Let s revisit some de nitions. Let G = (V; E) be a graph. De nition 1 Removing

More information

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007 CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information